Security considerations for Installation Manager
Store credentials
Store our credentials if we use secured repositories.
encryptString
Use the encryptString command with the -passwordKey option to encrypt passwords in response files or on the command line.
Command-line mode imcl command-line arguments Silent mode Command-line arguments for silent mode A package might encrypt and decrypt text before the text is persisted in a response file or in the installRegistry directory. By default, Installation Manager uses a static password key to encrypt the text. This password key might be decrypted and used to decrypt the encrypted text. We can use a different password key to encrypt the text using the -passwordKey option. If we provide a password key, we must start the instance of Installation Manager with the same password key each time to access the encrypted data. The password key must be used when you start Installation Manager in wizard mode, console mode, command-line mode, and silent mode.
You can encrypt a value to use in a response file using the encryptString command. Values that are encrypted in the response file or in the installRegistry directory are specific to a package. For information about the values that are encrypted, see the package documentation.
Internet preferences
Set preferences to accept certificates for SSL connections, delete stored credentials, or use proxy servers to create connections to remote servers from behind a firewall.
- Wizard mode:
- Command-line mode: imcl command-line arguments
- Console mode: Set preferences in console mode
- Silent mode: Silent installation preference keys
Installations for IBM i and IBM z/OS
If we are installing on the IBM i or the IBM z/OS operating systems, review the installation topics for security information.
Permissions
Review information about permissions.
- Windows: Run as administrator on Windows
- UNIX: Install as an administrator, nonadministrator, or group
- Group mode: Permissions in group mode
Cookies
This software offering does not use cookies or other technologies to collect personally identifiable information. For additional information on cookies, see Notices.
Home